Verifiable Private Multi-party Computation: Ranging and Ranking

被引:0
作者
Zhang, Lan [1 ]
Li, Xiang-Yang [1 ]
Liu, Yunhao [1 ]
Jung, Taeho [1 ]
机构
[1] Tsinghua Univ, TNList, Dept Comp Sci & Technol, Beijing, Peoples R China
来源
2013 PROCEEDINGS IEEE INFOCOM | 2013年
关键词
Verifiability; Privacy; Multi-party Computation; Ranking; Ranging; Dot Product;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The existing work on distributed secure multi-party computation, e.g., set operations, dot product, ranking, focus on the privacy protection aspects, while the verifiability of user inputs and outcomes are neglected. Most of the existing works assume that the involved parties will follow the protocol honestly. In practice, a malicious adversary can easily forge his/her input values to achieve incorrect outcomes or simply lie about the computation results to cheat other parities. In this work, we focus on the problem of verifiable privacy preserving multiparty computation. We thoroughly analyze the attacks on existing privacy preserving multi-party computation approaches and design a series of protocols for dot product, ranging and ranking, which are proved to be privacy preserving and verifiable. We implement our protocols on laptops and mobile phones. The results show that our verifiable private computation protocols are efficient both in computation and communication.
引用
收藏
页码:605 / 609
页数:5
相关论文
共 50 条
  • [41] A Dynamic Tradeoff between Active and Passive Corruptions in Secure Multi-Party Computation
    Hirt, Martin
    Maurer, Ueli
    Lucas, Christoph
    ADVANCES IN CRYPTOLOGY - CRYPTO 2013, PT II, 2013, 8043 : 203 - 219
  • [42] Secure Multi-Party Private Set Intersection with Semi-Honest Nodes
    Najarkolaei, Seyed Reza Hoseini
    Aref, Mohammad Reza
    2022 10TH IRAN WORKSHOP ON COMMUNICATION AND INFORMATION THEORY, IWCIT, 2022,
  • [43] SoK: General Purpose Compilers for Secure Multi-Party Computation
    Hastings, Marcella
    Hemenway, Brett
    Noble, Daniel
    Zdancewic, Steve
    2019 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2019), 2019, : 1220 - 1237
  • [44] The oblivious comparison sorting protocols for secure multi-party computation
    Ch, Koteswara Rao
    Singh, Kunwar
    Kumar, Anoop
    MULTIMEDIA TOOLS AND APPLICATIONS, 2024, 83 (26) : 67763 - 67777
  • [45] Secure Coded Multi-Party Computation for Massive Matrix Operations
    Akbari-Nodehi, Hanzaleh
    Maddah-Ali, Mohammad Ali
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2021, 67 (04) : 2379 - 2398
  • [46] On secure multi-party computation in black-box groups
    Desmedt, Yvo
    Pieprzyk, Josef
    Steinfeld, Ron
    Wang, Huaxiong
    ADVANCES IN CRYPTOLOGY - CRYPTO 2007, PROCEEDINGS, 2007, 4622 : 591 - +
  • [47] Secure Multi-Party Computation for Personalized Human Activity Recognition
    Melanson, David
    Maia, Ricardo
    Kim, Hee-Seok
    Nascimento, Anderson
    De Cock, Martine
    NEURAL PROCESSING LETTERS, 2023, 55 (03) : 2127 - 2153
  • [48] MOTION - A Framework for Mixed-Protocol Multi-Party Computation
    Braun, Lennart
    Demmler, Daniel
    Schneider, Thomas
    Tkachenko, Oleksandr
    ACM TRANSACTIONS ON PRIVACY AND SECURITY, 2022, 25 (02)
  • [49] Secure Multi-Party Computation for Personalized Human Activity Recognition
    David Melanson
    Ricardo Maia
    Hee-Seok Kim
    Anderson Nascimento
    Martine De Cock
    Neural Processing Letters, 2023, 55 : 2127 - 2153
  • [50] Complete Fairness in Multi-party Computation without an Honest Majority
    Gordon, S. Dov
    Katz, Jonathan
    THEORY OF CRYPTOGRAPHY, 6TH THEORY OF CRYPTOGRAPHY CONFERENCE, TCC 2009, 2009, 5444 : 19 - 35